GirlChat #599471
The critical vulnerability in the TAILS operating system discovered by researchers at Exodus Intelligence lies in the I2P software thatÂ’s bundled with the OS and the company has released some details and a video demonstrating an exploit against the bug. Exodus researchers said that the vulnerability can be used for remote code execution as well as de-anonymization of targeted users on TAILS.
I2P is an anonymity network, somewhat analogous to Tor, that encrypts all of its communications from end to end and enables private and anonymous use of the Internet and resources such as email, chat and Web browsing. Full article: http://threatpost.com/researchers-demo-tails-flaw-exploit-disclose-details-to-developers |